G O V E R N M E N T
Security News October/November 2014 Digital Edition j
Los Angeles Sheriff’s Department and Geofeedia write the playbook on using Social Media and location based technology in law enforcement. Page 11
æ TA B LE
OF
C O N T E N T S N E W S
A N D
F EA T UR ES
OCTOBER/NOVEMBER 2014 SPECIAL REPORTS
Big update in law enforcement tool-kit “ Our successful joint operation with the FDA proves again the relevance of social media in intelligence-led policing. Our eComm unit delivers great value by providing real-time, actionable intelligence to our field officers. Geofeedia’s location-based social media monitoring solution is a powerful tool to help us deliver that value.” Commander Mike Parker, Los Angeles Sheriffs Office
Page 11
Port of Charleston, SC integrates fence detection and video analytics PureActiv® provides intelligent video analytics, 3D geospatial command and control, autonomous PTZ tracking and open architecture for ease of integration with the MicroPoint™ Cable system which pinpoints fence cut or climb attempt to within 3m, while ignoring environmental disturbances such as wind, rain or vehicle traffic.
Page 26
2 Government Security News
October/November 2014
Digitlal Edition
8
Cybersecurity Workforce Competencies: Preparing Tomorrow’s Risk-Ready Professionals
18
23
28
X-ray systems manufacturer Astrophysics awarded $6 million U.S. Navy Contract Page 4
F-35C Completes First Arrested Landing aboard Aircraft Carrier Page 23
Hey, Governors Christie and Cuomo! Good job with the Airports. But what about the Seaports? asks Denise Krepp In “Ebola by Sea” Page 6
Romanowich on Video Surveillance New physical standards in the Works for electrical substations
Don Waddell of (ISC)2/University Of Phoenix initiative wants to close the supply demand gap in filling cybersecurity jobs Page 8
Page 24
Port of Charleston, SC Case Study Puretech Systems Integrates Fence Detection and Video Analytics at Port with $50 billion annual cargo Page 26
Law Enforcement Communications L.A. Sheriff’s Department (LASD) and Geofeedia write the playbook on using Social Media and location based technology Page 11 BriefCam Syndex offers rapid view video synopsis At Israel Exhibition Page 16
Kastle Systems/Metro DC Police launch City-wide network of video cameras and floor plans Page 18 Mutualink Unveils Mobile Go Kit for Interoperable Public Safety Community at IACP Page 20
Digitlal Edition
October/November 2014
Government Security News 3
æ UPFRONT
Astrophysics Inc. awarded $6 Million United States Navy Contract
contract to supply and deploy ruggedized X-ray inspection
Rapidly growing X-ray systems manufacturer Astrophysic Inc of City of Industry, CA, has won a $6
systems. According to company sources, Astrophysics’
Astrophysics’ XIS-
competitive advantages in the bidding included not only
7858 system which
that the company buys primarily from U.S. vendors, but
features a standard
also that it has its own fabrication facility, enabling it to
180kV generator for
pass manufacturing savings along to customers.
heightened penetration
“Astrophyics is known around the world for market-
ABOUT ASTROPHYSICS INC.
The Navy selected
and enhanced object recognition. The XIS-7858
million dollar contract from the U.S. Navy to protect
leading solutions,” said Francois Zayek, Founder and
is the ideal screening solution for any location in
entry control points deployed at seaports around the
CEO of the company and a former VP of Research,
need of increased screening dimensions within
world. The company’s X-ray solutions will be used to
Development and Engineering at Perkins Elmer, who is
a consolidated space. The Indefinite Delivery,
screen visitors and personnel before they embark and
known globally for his engineering innovations. “We have
Indefinite Quantity (IDIQ) contract was issued by
to accelerate offloading processes.
a long history of helping protect men and women that
the Navy XRBS program which is managed by the
protect our great nation and we are pleased to announce
Crane Division out of Indiana. Ω
Astrophysics was selected from a large field of competitors to fulfill the Navy’s XRBS program’s five-year
Astrophysics offers X-Ray security screening systems that help operators detect and identify weapons and explosives in civil and military markets worldwide. The company exports to over 60 countries and builds all its own products domestically in Southern California. The corporate hearquarters located in City of Industry, CA is the manufacturing facility for air cargo, conventional and mobile solutions. A second facility in Ontario, CA is the primary location for research and development, and the high energy cargo and portal systems. Astrophysics markets range from Air Cargo, Aviation and Transport to Corporate and Hotels, Customs and Border Protection, Government, Law Enforcement and the Military. The company employs over 140 employees in the U.S. and has affiliate company’ globally. For more information about Astrophysics, visit www.astrophysicsinc.com.
this contract.”
THE NEW ENTRY
GUARANTEED DELIVERY DATES
for ACCESS CONTROL POINTS FULLY GALVANIZED FRAMEWORK
SINGLE SOURCE FOR PHYSICAL SECURITY a AMERISTARBOOTHS.COM
4 Government Security News
October/November 2014
Digitlal Edition
| 855.526.6847
Digitlal Edition
October/November 2014
Government Security News 5
æ UPFRONT
Ebola by Sea BY DENISE RUCKER KREPP Over the past several days, governors in New York, New Jersey, Illinois, and Connecticut issued quarantine guidance for individuals who’ve been in contact with African Ebola patients. The state guidance focuses on individuals who’ve returned to the U.S. via airplanes. At some point a mariner is going to arrive, sick with the dangerous disease. Unfortunately, the federal government has yet to address this possibility and state governors won’t be willing to wait for the bureaucratic federal machine to churn out vague policy guidance. They’re going to issue state guidance and this guidance could significantly impact U.S. port operations nationwide. The U.S. Coast Guard is the federal agency responsible for port operations and the Coast Guard Captain of the Port manages port operations on a dayby-day basis. This individual can prevent a foreign flag ship from entering a U.S. port. He or she can also require foreign flag vessels who have ported Sierra Leone, Guinea, and Liberia, Ebola stricken nations, to undergo additional scrutiny before they are allowed in U.S. waters. The agency released a marine safety information bulletin last week that everyone in the maritime industry should read. The bulletin recommends that “local industry stakeholders work with the Coast Guard Captain of the Port to review and be familiar with their Marine Transportation System Recovery Plan.” These plans were mandated after the 9/11 attacks and the agency issued guidance earlier this summer on how to draft them. As someone who doesn’t believe in re-inventing the wheel, I strongly support using existing guidance 6 Government Security News
October/November 2014
to address current crises. The problem in this situation is that the recovery plans don’t address Ebola-like catastrophes. These plans focus on terrorist attacks and natural hazards similar to Hurricanes Katrina and Sandy. They don’t address a ship manned with mariners decimated by Ebola. The Coast Guard appears to recognize the shortcomings of the current recovery plan by recommending in the October 22nd bulletin that the local stakeholders “consider conducting a table top exercise to plan and address items such as an evaluation of how to handle a vessel arrival with a suspected Ebola case... what steps need to be considered if a medical evacuation is needed, and possibly how a ship would be decontaminated in order to commence cargo transfers.” Good idea. A seaport is a finely-tuned machine. According to the Bureau of Transportation Statistics, in 2011, 7,662 oceangoing vessels made 67, 929 calls at U.S. ports. Time is money for vessels owners – they want to enter a port, discharge their cargo, taken on new cargo, and depart as fast as they can. They are not going to want to wait for the Coast Guard Captain of the Port and local stakeholders to decide how to address a vessel with a suspected Ebola case. A simple answer would be to ban all ships that have stopped in Sierra Leone, Guinea, or Liberia in their last five previous ports of calls. Sadly, that won’t work because the U.S. government is sending U.S. ships to these countries to provide food aid and medical support. People in Ebola areas need to eat and U.S. grown crops are helping them to survive. It would immoral to stop shipping food to those in need. Digitlal Edition
If the U.S. can’t ban all ships that have ported in Ebola-stricken countries, then the U.S. Coast Guard must develop a more comprehensive plan to address the possibility of Ebola victims arriving in the U.S. by sea. The agency can’t merely recommend that local stakeholders conduct table top exercises. These exercises should be mandatory and the Coast Guard must be ready to provide substantive guidance. Keeping in mind that several governors have already issued isolation guidance for air travelers, the Coast Guard must work the governors now to address the maritime sector. How are sick mariners evacuated? At sea via helicopter or a smaller vessel? At the port by ambulance? How is the vessel decontaminated? How and when are the necessary personnel going to be trained to carry
out the evacuation and decontamination procedures? What happens to the other in-coming vessels during the decontamination process? If the Coast Guard can’t answer these questions, the state governors will because they won’t their ports contaminated with the Ebola virus. Ports bring in revenue and the revue can’t drop. The Coast Guard prides itself on being Semper Paratus. Now, more than ever, it must live up to its motto. The nation’s ports can’t be shut down because of Ebola and they won’t be if the Coast Guard develops more comprehensive guidance before the first ship arrives. Pre-planning with local stakeholders, including governors, will ensure that the country’s supply chain continues to operate. Call your local Captain of the Port and ask him or her to schedule the table top exercise. Ω
PHYSICAL SECURITY with COMPLETE PERIMETER CONTROL
ANTI-CLIMB FENCE
RETRACTABLE WEDGES
ANTI-RAM FENCE
SECURITY BOLLARDS
Call our perimeter security specialist at 866-467-2773 and visit us online at ameristarsecurity.com Digitlal Edition
October/November 2014
Government Security News 7
æ UPFRONT
Dan Waddell discusses urgency of (ISC)2 Foundation/ University of Phoenix initiative to close the supply and demand gap in filling cybersecurity jobs
T
urgency, in short, is that there is a serious gap between
he core mission of the (ISC) Foundation, in the 2
supply and demand in the realm of cybersecurity
simplest of terms, is to support cybersecurity
professionals.
education and awareness. With a global
Cyber security accounts for approximately 10% of all
membership of over 100,000 certified information
IT occupations, and cybersecurity-related positions are
security professionals, (ISC)2 exists “to ensure that
growing faster than all IT jobs. Cybersecurity job openings
children everywhere have a
take 24% longer to fill than all
positive, productive and safe
IT openings, and 36% longer to
experience online; to spur
fill than all vacancies, regardless
the development of the next
of industry. U.S. employers pay
generation of cybersecurity
qualified candidates a premium
professionals; and to illuminate
for cybersecurity jobs – an
major issues facing the issue
average of $93,028 annually,
now and in the future.”
or over $15,000 more than other IT jobs overall. In 2013,
At the 2014 ASIS Conference, which hosted over 20,000 visitors,
U.S, employers posted 50,000
1,600 of the attendees were
new jobs requiring Certified
there to attend the co-located
Information Systems Security
(ISC)2 conference, according to
Professionals (CIISP) credentials,
Dan Waddell, Director of US
but there were only 60,000 total
Government Affairs of (ISC)2, who
Cybersecurity Workforce Competencies: Preparing Tomorrow’s Risk-Ready Professionals
existing CIISP holders.
“It’s an education-to-workforce gap,” said Waddell,
spoke with GSN a few days after the ASIS Conference about the rationale behind the huge delegation. The
and it’s hindering the efforts to fill cybersecurity jobs.”
obvious opening question was, What’s the urgency?
According to recent findings by Cisco, he pointed out, there are a million jobs that are not being filled. “The
Waddell had a strong answer to this question, one that arose from his own knowledge of cybersecurity and
supply has gone up slightly, but the demand has gone
was further informed in great detail by an in-depth report
through the roof.” “The CISSP is the gold standard of information
commissioned by the University of Phoenix and (ISC)
2
that was named, “Cybersecurity Workface Competencies:
security professionals,” he said, “but it’s not just ‘tech’ that
Preparing Tomorrow’s Risk-Ready Professionals.” The
they need. “We’re trying to teach students the importance
8 Government Security News
October/November 2014
of the cyber battlefield and the tools they need to
cybersecurity professionals, and to identify actionable
defend it – not just the software and hardware, but also
recommendations for key stakeholders to better prepare
knowledge and experience. An effective cybersecurity
students to enter careers in cybersecurity.
professional should have a good balance of education
The focus was on identifying what educational
and experience on his or her resume. A credential serves
institutions, employers, industry associations and
as a validation mechanism. Giving students a head start
students can do to bridge three education-to-work gaps:
on the education piece is where (ICS)2 can help through
a competency gap, a professional experience gap; and an
its Global Academic Program, which gets colleges and
education speed-to-market gap. The roundtable partners
universities working with our common body of knowledge
included representatives from institutions of higher
to help introduce cybersecurity topics in their curricula.
education that educate cybersecurity professionals;
We need kids to major in cybersecurity.
organizations that employ cybersecurity professionals;
The reason we have the gap, according to Waddell,
industry associations that support and provide
is that “cybersecurity is still a relatively new industry –
certifications to cybersecurity professionals; and the
compared to other disciplines such as law or medicine.
Department of Labor, which develops research and tools
Until very recently,
for workforce prosperity
we haven’t had a real
and achievement.
definition of a career
$4.7
63%
path in cyber, and even know what job titles to assign. We have to understand requirements first, then align skills and
Billion
Billion
sometimes we don’t CISO
$445
CIO
The roundtable also incorporated the perspective of a cybersecurity student/
63 % of U.S. Federal CIOs (Chief Information Officers) and CISOs
Annual cost
Proposed annual
U.S. Department of Defense
(Chief Information Security Officers) say
improving cybersecurity is a top priority
spending on cyber activities
of computer- and network-based crimes worldwide
Sources: Homeland Security News Wire, “Improving Cybersecurity Top Priority: Federal CIOs, CISOs,” June 12, 2014, http://www.homelandsecuritynewswire.com/dr20140612improving-cybersecurity-top-priority-federal-cios-cisos. Andy Sullivan, “Obama Budget Makes Cybersecurity a Growing U.S. Priority,” Reuters, April 10, 2013, http://www. reuters.com/article/2013/04/11/us-usa-fiscal-cybersecurity-idUSBRE93913S20130411. Tom Risen, “Study: Hackers Cost More Than $445 Billion Annually,” U.S. News & World Report, June 9, 2014, http://www.usnews.com/news/articles/2014/06/09/study-hackers-cost-more-than-445-billion-annually.
career-starter on higher education practices and career entry. The findings of
competencies through a common framework, so that
these groups and other thought leaders with relevant
we’re all on the same page. DHS and NIST have developed
experience in competency modeling, higher education,
such a framework under a program called the National Figure 1. Most major cybersecurity breaches have one of seven causes.
Initiative for Cybersecurity Education (NICE). So that’s a
cybersecurity services and cybersecurity credentialing Figure 2. Ninety-four percent of cybersecurity breaches in 2013 fell into these nine categories.
resulted in the recommendations coming out of the
4.55% great start. (ISC)2 is supplying 11.18% credentials that ■align with CEO/president/ 5.18%
4.55% which were report, designed to be useful to the larger ■ CEO/president/ 11.18% 5.18%
the NICE framework.”
owner/principal/ 8.07% Distributed community of6%industry leaders, employers, educators and partner denial-of-
general manager/ owner/principal/ Naive8.07% end users partner and disgruntled ■ Chief security employees officer Users not perimeter ■NoVice President keeping up with protect ■ to Director new tactics 28.57% ■ Manager ■ Supervisor of 42.44% security personnel
42.44%
Mobile Note. Total who responded to the question = 483 (100%)
Note. Total who responded to the question = 483 (100%)
As co-hosts of the “Cyber Workforce Competencies”
general manager/
Physical theft/loss
report co-hosted by the University of Phoenix, and the Top 7 causes (ISC)2 Foundation, the host organizations relied on Under-
of cybersecurity
estimating devices as breaches findings from an industry roundtable with cybersecurity cyberideal entry criminals
points
professionals and talent leaders, with the objective
Lackcareer of a layered priorities of investigating competencies and Loss of mobile of defense
Digitlal Edition
devices
28.57%
Most
■ ■ ■ ■
Vice President Director Manager CyberSupervisor of espionage security personnel
Editor’s Note: Common Miscellaneous categories of errors This is thecybersecurity first of several articles that GSN intends to publish breaches Point-of-saleintrusions based on the information released in the University of Phoenix/ Crimeware Payment (ISC)2 Foundation’s Cybersecurity Workforce initiative and report. card Insider misuse
Digitlal Edition Source: Kaseya.
Other ■ Chief security
service
Web officerapp current attacks or future cybersecurity professionals. Ω attacks
skimmers
October/November 2014
Source: Verizon, based on reports from 50 companies.
Government Security News 9
Law Enforcement Communications
Radiation Identification
L.A. County Sheriff’s Department and Geofeedia write the playbook on using social media and location-based technology in law enforcement
The detection and analysis of hidden radioactive nuclides requires radiation identification instruments with high sensitivity and accuracy. The expense, weight and complexity of this equipment prevents many safety and security teams from having the right tools to manage a dangerous radiation scenario. The new Thermo Scientific™ RadEye™ SPRD Spectroscopic Personal Radiation Detector makes radiation identification accessible and affordable. The palm-sized, RadEye SPRD is a high-performance, radiation monitor designed to expose, locate and identify radioactive nuclides such as orphaned or hidden sources. Like the trusted Thermo Scientific™ RadEye™ PRD Personal Radiation Detector, the RadEye SPRD is intuitive, rugged and operates 170 hours on standard AAA batteries. This combination makes it the perfect solution in unpredictable and challenging scenarios. With a low cost of ownership the RadEye SPRD is an affordable way to put radiation identification in the hands of the entire team.
is within grasp • Get the New RadEye SPRD brochure: thermoscientific.com/sprd Talk to an Expert: 1-800-274-4212
Detect, Locate and Identify radioactive threats with the new RadEye SPRD.
E
arlier this year, the Los Angeles County Sheriff’s Department (LASD), under Commanders Scott Edson and Mike Parker sent out an invitation to 19,000 law enforcement agencies in the U.S. and overseas inviting them to try a new crowdsourcing platform called LEEDIR, by which eyewitnesses to a crime or emergency, anywhere, could upload and share high-resolution photos and videos with law enforcement agencies for free and in real-time. At GSN, we were so impressed with this initiative that we labeled it “History in the Making” and ran a front page cover story on it in our April 2014 Digital Edition.
© 2014 Thermo Fisher Scientific Inc. All rights reserved. All trademarks are the property of Thermo Fisher Scientific and its subsidiaries.
10 Government Security News
BY ADRIAN COURTENAY
Now, half a year later, the L.A. Sheriff’s Department
October/November 2014
Digitlal Edition
technology developed by Geofeedia of Chicago, IL. Geofeedia’s unique approach organizes social media by location, as opposed to the long-standing industry approach of organizing social media solely by keyword or hashtag without regard to location. The result: a new set of data focused on the places where events happen. The key to the new approach is that emergency services, including law enforcement, place a Geofeedia virtual perimeter around a designated geographical area – which can be as big as a city or as small as a single
is once again sharing law enforcement history, this time
address – and then monitor social media openly shared
by using innovative crowd sourcing and social media
by the public within that perimeter.
Digitlal Edition
October/November 2014
Government Security News 11
Grundy County Sheriff ItLaw started with school safety • Geofeedia Enforcement Communications In a discussion with GSN, LASD Commander Mike Parker SITUATION: made have it clear thatvulnerable one of the Schools been to acts of violence at an most surprising revelations alarming rate in recent months. More than 7 percent of 9th through graders being about 12th the use of a reported “geo-fence” is threatened or injured with a weapon on school property that many people at the scene at least once in the last
year. An additional 6 percent admitted to bringing a weapon
of a crime or an emergency
to school for protection.
in progress often openly post
located on Cleveland’s west side when a group of 20 men
introducing it to students as an important tool in modern
surrounded him on the sidewalk. The group attacked and
crime fighting:
severely beat the man, stole his phone, and ran. Immediately following the crime, Patrol Sergeant Tanya Sirl used Geofeedia to draw a perimeter around the scene of the In the wake of this incident, GrundyofCounty Sheriffand has the outset the incident incident and surrounding areas, searched back to the time of taken full advantage of had Geofeedia to monitor social woman who the crime, and began scouringobserved the socialamedia content. media in locations beyond schools in the neighboring
had seized a knife from a store
towns. According to GIS Analyst Dave Ostrander, the It was while reviewing these postsand thathad sheslashed came across display a easy navigation and reliability of the application has been individuals who had posted to Facebook about going toThe a number of other customers. fundamental to the success of Geofeedia in Grundy County. “93rd Street block party” deputy (a common gang reference often responded by and drawing Ostrander knows that it can help solve crimes provide synonymous with being up to no good). weapon and facing the situational awareness tohis potential public safety down hazards.
information onto the Internet,
specifically in social media, and a founder found at an Oswego school through Geofeedia’s social of before they even think of dialing media monitoring software.
Geofeedia
LASD Commander ADDITIONALLY: Michael J. Parker
to combat violent crime because it is the best way to monitor high crime areas. With what people are posting these days, it doesn’t take much time to find evidence against criminals. It is simply amazing what can be done with this platform.”
enables law enforcement agencies to be
her hand with blood dripping off
more effective in dealing with emergency
of it. In the last moment before
situations ranging from teen suicide,
he had to shoot, the woman
natural disasters to shooting and threats
Another example of the importance of Geofeedia within Grundy County was the monitoring of an ice jam on the
911 and reporting it to the
dropped the knife and was put into handcuffs by the off
police. Often, the public share postings, including the
duty and other who hadWith just the arrived haddeputy to respond quicklydeputies to the situation. help on of
“Geo-Tagging”, which indicate the latitude and longitude
the scene, with no loss of life. Geofeedia, officials in Wilmington, Illinois were able to
Kankakee River. Emergency responders were notified and
“First responders need reliable, accurate information,” Harris indicated, “and that can be obtained within 15 feet of the person posting because of the GPS coordinates produced by Geofeedia. “We have gathered hundreds of millions of social media posts on behalf of our customers across Twitter, Instagram, YouTube, Facebook, Picasa, Flickr and other sources,” he said. “It starts with a map. Then you select the location you want to focus on and
- Patrol Sergeant Tanya Sirl
woman, who still had the knife in
Geofeedia Case Study: Hate Crime in Cleveland
Grundy County, Illinois had its own scare when a gun was Phil Harris, CEO
“Geofeedia is something we are all using as a tool
adjust the boundaries. Social media posts will then pop
against schools. A great deal of information shared by social media, Parker pointed out, is
of the exact location. Prior to the days of social media,
monitor social media in thedid area and view photos The question was, how the reporter know posted about
“open source information”, meaning that
he said, the typical scenario was that if members of the
byongoing citizens situation in real-time, therefore assisting responders the before the police knew about it? with
it is shared for the world to see, including
public saw something suspicious, they would call the
The answer was clear: Social media, which was obviously
law enforcement. There is no reasonable
police and the police would send a patrol car to see if
being followed regularly by reporters. In Parker’s words,
expectation of privacy if it’s shared in a way
the report was accurate and then act on it. In addition to
“All of the news media these days are monitoring social
that “A boy in a basement in Belgium could
SOLUTION: keyword searches, now that law enforcement can access
media. If they’re not, they’re way behind the times and
view the same information” he said. “But a
Officers were able to react quickly based on area, intelligence social media activity within a geo-fenced he pointed
their competitors. Tools like Geofeedia are extensively
line is drawn where there is password protection because
used by leading news agencies.”
then there usually needs to be an ongoing criminal
up within those boundaries. In addition, if you find a post
investigation or potentially a search warrant signed by a
you're interested in, you can blow it up and put in on a
judge to get that information.”
map. One of the most powerful things about Geofeedia,”
provided the location-based platform through postings out, theby police can get additional focused, geographically on several social media outlets. Real-time tweets coming
relevant and important information, and they get it faster.
from inside the school were communicated to police officers
Describing an incident that he had experienced a
on the scene. Geofeedia allowed law enforcement to draw
additional actionable data.
According to Commander Parker, surveys have indicated that about 8% of the U.S. population uses
In a separate interview with GSN, Phil Harris, CEO
he added, is that in addition to location, you can also locate
few years around earlier,the Commander Parker said he was received a a perimeter area in order to see what
geotags when sharing opening by social media on their
phone callinside from aschool newswalls. reporter asking about a shooting taking place After officers secured the
mobile phones, thereby making their global position
and a founder of Geofeedia, agreed with Commander
by word or phrase. You can also take data that’s in the
perimeter the school, was discovered that the gun that hadaround supposedly takenitplace, with people being
public information, since their geotags give latitude and
Parker in pointing out that law enforcement wasn’t the
public domain and take it to a location. You don’t need to
was by at a contractor in the faculty bathroom. The hitdropped by bullets, a local supermarket. When sheriff’s
longitude and often include tags of photos on social
first sector to use social media, since the marketing and
go to the Instagram site. You can see it all on Geofeedia in
media. He added that the percentage is probably twice
business worlds had been mining social media and crowd
a single search, which makes it fast and efficient for first
that number, or 16%, when teenagers share openly. This
sourcing for many years. But law enforcement is learning
responders.
students were safe and thescene, weapon was secured thanks to deputies arrived at the they learned that an off the services provided by Geofeedia.
duty deputy sheriff had been in the supermarket at
fast that everyone with a phone or a camera is an “Geofeedia is easy to use and always works. Its technology has solved crimes and provided our squad cars with visibility into what is taking place during some very sensitive situations.” - Dave Ostrander | GIS Analyst 12 Government Security News
October/November 2014
Geofeedia Case Study: Grundy County Sheriff
Digitlal Edition
According to L.A. County Sheriff’s Department Deputy
eyewitness that can support first responders by sharing
Tony Moore, who worked with Commander Parker and
what they see through social media posts, he said, as the
used the law enforcement Geofeedia app, illegal pre-
capture of the Boston bombers demonstrated.
planned teen drug parties had become an escalating
Digitlal Edition
October/November 2014
Government Security News 13
the Nozz distribution network also eliminated a significant
organization plans to continue spreading their knowledge
revenue source for gangs. To fund other criminal activities,
about Geofeedia.
gangs often taxed Nozz distribution at drug parties. The
Law Enforcement Communications • Geofeedia
About Geofeedia
operation also reduced an environmental threat. Federal authorities have estimated that the damage to the ozone
problem in Los Angeles County and its population of ten million people across 88 municipalities and 130 unincorporated communities. Pre-planned teen drug parties had become an escalating problem in Los Angeles County, contributing to a measurable increase in felony and
from the illegal use of nitrous oxide in the greater LA area is more than what a small oil refinery in the center of the city
data by location to provide users with real-time insights
were seized as evidence, including assault weapons, armor piercing rounds, and high capacity magazines. Another the intention to sell them (a felony charge). Finally, with
events that were primarily organized and
Geofeedia’s location-based social media monitoring and
(eComm) which had been founded in 2012, used key word search systems such as Hootsuite and the Geofeedia patented, cloud-based program to search, monitor and analyze real-time openly shared social media posts via social media networks. “What we like about Geo-searching is a look at a particular location, draw a map and immediately start
Request a free demo at: geofeedia.com/demo
of multiple suspects on weapons charges. Thirteen guns
suspect was arrested for possession of narcotics with
the 24-hour LASD Electronic Communications Triage Unit
from anywhere in the world.
In addition, the search warrants also resulted in the arrest
vehicular burglary, and gang activity – all
To police the pre-planned parties,
About the Los Angeles County Sheriff’s Department
keyword analysis the eComm unit interdicted more than 1,000 parties and reduced felony assaults by 50%.
The Los Angeles Sheriff’s Department is the largest sheriff’s department in the world with a mission to “lead the fight
“Our successful joint operation with the FDA proves
to prevent crime and injustice, enforce the law fairly and
again the relevance of social media in intelligence-
defend the rights of all, including the incarcerated.” The
led policing. Our eComm unit delivers great value
department is divided into eleven divisions and specialized
by providing real-time, actionable intelligence to
services including four patrol divisions, Custody Operations
our field officers. Geofeedia’s location-based social
Division, Correctional Services Division, Detective Division,
media monitoring solution is a powerful tool to help us
Court Services Division, Technical Services Division, Office
deliver that value.”
of Homeland Security, Administrative Services Division, and
- Commander Mike Parker
gathering real-time intelligence” said Deputy Moore,
Leadership and Training Division. Learn more at: lasdhq.com
adding, “We’re not shy about recommending this ability to
northeast Ohio town. In reviewing the social media within
other agencies as this simplifies a lot of things and will help
the perimeter she had drawn, the Sergeant came across
other agencies accomplish their public safety mission.”
individuals who had posted to Facebook about going to
sales@geofeedia.com
@geofeedia
The Geofeedia website has archived a number of
a “93rd Street block party”, which was a common gang
law enforcement Case Studies which can be accessed by
reference often synonymous with being up to no good.
law enforcement officials. These include one study which
Through this connection, was taken toSheriff’s one of the Geofeedia Case Study: Los she Angeles County Department
describes how situational awareness was established
town’s known gang members who was also talking about
by a group in West Virginia, using Geofeedia’s social
the block party, and shortly thereafter, the gang member
media monitoring software and drawing a perimeter
was identified as one of the attackers, which led to an
around locations such as specific colleges or universities,
arrest by the town’s gang unit.
neighborhoods, city blocks or specific buildings.
security, branding or healthcare,” said Phil Harris, “but
draw a perimeter around the scene of a brutal attack by
it’s a game-changer for law enforcement, public safety,
20 men that had taken place outside of a gay bar in a
emergency response and health crises.” Ω
October/November 2014
geofeedia.com/demo
“Geofeedia can be used by the media or for corporate
In another, a Patrol Sergeant used Geofeedia to
14 Government Security News
by location. Our patented technology searches Twitter, Facebook, Instagram, YouTube, Flickr, Picasa, and Viddy
would cause annually.
sexual assaults, related property damage,
advertised via social media networks.
Geofeedia provides social media search and discovery
Digitlal Edition
Digitlal Edition
October/November 2014
Government Security News 15
BriefCam Syndex offers rapid review Video Synopsis video solution at Israel Exhibition BriefCam®, the developer and provider of Video Synopsis® solutions for the rapid review, analysis and indexing of video, has announced a new offering
...
To Secure a Perimeter
Law Enforcement Communications • Briefcam BriefCam successfully in the field. These include the departments of defense, the law enforcement agencies, and
success is all about choosing the Right Products.
■ The right Barriers
■ The right Sensors
■ The right Gates
■ The right Fences
■ And most important of all,
the right Guard Station/House
the intelligence communities in North America, Europe, China, the APAC region and, of course, Israel.”
If you don’t protect your staff and systems, they can’t protect your students and faculty A B.I.G. guardhouse is different from all others because we have invested over 40 years in studying and understanding what goes on inside—and outside—of a superior guard station. This expertise comes to you in the form of a full line of B.I.G. Enterprises guardhouses—the cornerstones of your “hardened” perimeter. With B.I.G. your guardhouse doesn’t have to appear hard and unattractive—it can be your steel fist inside of a velvet glove.
BriefCam Syndex is a next-generation product range based on Video Synopsis technology. (See: YouTube/ BriefCamVS). Video Synopsis is the simultaneous presentation of objects, events and activities that occurred at different times. Users can pinpoint events Continued on page 32
tailored to the needs of government investigative agencies and law enforcement: BriefCam Syndex GV, to be available in Q1 2015. The announcement was made at the Israel HLS Exhibition (iHLS 2014) running from November 1012 in Tel-Aviv. “Two years ago, we won the iHLS Innovation Award 2012. Since that time,
We Didn’t Want Standard Shelters, We Wanted B.I.G. “Some folks make cheaper booths, but no one makes a better booth than B.I.G. They build superior, high-quality modular booths. The highest quality in the U.S."
our product line has matured, our client base has expanded, and BriefCam has been used and recognized for its role in major criminal and homeland security-related investigations. For all of these reasons, we’re proud to be able
— East Coast Facility Manager
to announce BriefCam Syndex GV at Israel HLS 2014,” said Dror Irani, CEO and President of BriefCam. “This offering meets the needs of government agencies and was developed in response to direct feedback from high-profile users already employing 16 Government Security News
October/November 2014
BriefCam Syndex. The Video Synopsis can be refined by parameters such as color, direction, speed, size and area of interest / exclusion. New features include multiple video source capability, access restriction, floating camera licenses, mobile supprt and more Digitlal Edition
When overseeing the safety of your campus, call in the security heavyweights —because a perimeter without B.I.G. is like a holster without a gun.
Digitlal Edition
October/November 2014
Government Security News 17
Law Enforcement Communications • Capital Shield Program
ABOUT CAPITAL SHIELD
Kastle Systems and Metropolitan DC Police launch “Capital Shield” city-wide network of video cameras and floor plans to enhance first responder situational awareness
Capital Shield is a public-private partnership that unites the Washington, DC Metropolitan Police Department (MPD) with commercial property owners, businesses and institutions around a common goal of protecting the city. Through this program, participants can help enhance public safety by providing the MPD with direct access to their security cameras. This enables first responders to quickly gain the situational awareness required to most effectively assist and respond to major security events and emergency situations. For more information, visit www.capitalshield.org. Ω
I
n an innovative initiative backed by the city’s major real estate owners, managed security services firm Kastle Systems has launched an interconnected network of private security cameras, floor plans and other building information in partnership with the DC Metropolitan Police Department (MPD) that will allow first responders direct network access in order to enhance situational awareness in responding to emergencies and serious threats. According to the press announcement, the launch of “Capital Shield” is a culmination of nearly three years of collaboration between Kastle and the MPD, with the shared goal of making the nation’s capital safer and more secure. It is enthusiastically supported by major DC real estate firms, including Douglas Development, Vornado Realty Trust, ON Hoffman, First Potomac Realty Trust, The Tower Companies and Tishman Speyer. To catalyze the program, Kastle Sytems is donating 1,000 new security cameras to any real estate owner in the city that wants to participate in the program and has already deployed test sites with an additional 300 cameras expected to come online in the first phase. “Through this public-private partnership, Capital Shield will significantly increase the public safety of our nation’s capital,” said Kastle owner and DC area native Mark Ein. “There are thousands of existing cameras that should be made accessible to our police in times of need, and this program will add thousands more over time. The role of video security has never been more important or more evident in cities across the country. Modern video technology saves lives, catches criminals,
18 Government Security News
October/November 2014
ABOUT KASTLE Kastle Systems has been a leader in the security industry for more than 40 years with new technologies and advanced
security solutions. Kastle operates and manages security systems for its clients remotely, around the clock. Currently, Kastle protects over 10,000 locations nationwide and internationally today. Kastle’s outsourced security services significantly reduce costs and improve the critically important 24/7 performance of security systems for building owners, developers and tenants. Kastle Video delivers the latest advancements in monitored video solutions, including high-definition cameras, cloudenabled network recording and cutting edge video analytics. Headquartered in Falls Church, VA Kastle is the largest security company in DC, according to the Washington Business Journal. Kastle Systems also has offices in Los Angeles, San Francisco, Houston, Dallas, Chicago, New York, Philadelphia and Sydney, Australia. For more information on Kastle Systems, visit www.kastle.com or call 855-527-8531. Ω
deters crime and accomplishes something we all value – a safer city. Kastle is proud of the role we are playing to help DC. In further comments, Chief Cathy L. Lanier of the MPD added, “Video is a force multiplier for MPD. It gives us an extra set of eyes by allowing us to provide much needed situational awareness. The Capital Shield program is an important new step in working with private enterprise to enhance public safety throughout the city. I would like to extend a special thanks to our inaugural members and to Kastle for its donation to help the city make this a reality.” Speaking on behalf of his company and the other participating real estate firms, Patrick Tyrrell, Chief Operating Officer of Vornado/Charles E. Smith stated, “As owners in Washington, DC, our company supports the goal of a safe and secure city. Vornado is delighted to be an inaugural participant and to work with Kastle on the Capital Shield program to make a positive and lasting contribution to DC. The very presence of Capital Shield will make our buildings safer for our tenants, our residents and our surrounding communities.” Digitlal Edition
Digitlal Edition
October/November 2014
Government Security News 19
Mutualink, Inc.
1269 South Broad Street Wallingford, CT 06492
Law Enforcement Communications • Mutualink
RE D EFININGUnveils I NTEROPERA BIL IT Y Mutualink Breakthrough Mobile Go Kit for
Phone: (866) 957-5465 Web: www.mutualink.net E-Mail: info@mutualink.net
Affordable InteroperableIntuitive Public Safety Communications at IACP 2014
Controllable
I
n an important interoperable communications technology at the 121st Annual International
Key features include:
Interoperability Workstation | IWS
• Best-in-class security with military-grade encryption • Ease of use and deployment, with plug and play The Mutualink interoperable communications technology company, IWS provides an incident-based highly intuitive graphical user interface (GUI) functionality that can be effectively used by a dispatcher or incident manager to communicate with other introduced its Mobile Go Kit for first responders. In • Wide-area multi-mode involved dispatch personnel as well as with unitsconnectivity in the field. Interconnection of radio channels/ times of crisis, this easy-to-transport case for on-thetalkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either Chiefs of Police (IACP) conference, Mutualink, an
“Mutualink developed our interoperability solution as a mini-console, or in combination with an existing console position. The IWS is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink to enable first responder agencies to securely share safety officials and emergency managers to establish software is easy to manage for System Administrators and other key personnel. The IWS is the disparate radio, video and telephone communications secure command and control on the move, anywhere. primary operational user interface the Mutualink system. It consists of a standard x86 PC with each otherfor during emergencies,” said Mark Hatten, The kit connects to 4G LTE/3G or hard-wired internet, platform (desktop, laptop, etc.) running the Mutualink real-time communications application on Mutualink’s CEO. “Our new Mobile Go Kit puts all of that bridging radio and telephone and enabling first a Security Enhanced interoperability (SE) Linux operating system. into one case that can be set up in a
S
go interoperable communications enables public stand-alone,
responders to send and receive full motion video, files
and text messages from remote locations. The Mobile Go Kit, as shown at the Mutualink booth, contains an Interoperable Workstation (IWS), which allows public safety agencies to participate on the nationwide Interoperable Response and Preparedness Platform (IRAPP) network to collaborate with federal, state and local agencies, regardless of location.
20 Government Security News
mobile vehicle or transported to a temporary emergency management facility for real-time, ad hoc collaboration.” In Passaic County, New Jersey, the first Go Kit has already been made part of a counter-terrorism toolkit, ready to assist as the county prepares for any man-made or natural threat to security. The kit provides a fully portable information sharing solution; a flexible way to deploy resources as, when and where needed to attain inter-agency collaboration.
Standard Fixed Workstation DESKTOP IWS M500-100 Series
October/November 2014
Digitlal Edition
About Mutualink, Inc.
Digitlal Edition
October/November 2014
Government Security News 21
æ
S IWS
stand-alone, as a mini-console, or in combination with an existing console position. The IWS UPFRONT is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink software is easy to manage for System Administrators and other key personnel. The IWS is the primary operational user interface for the Mutualink system. It consists of a standard x86 PC Law Enforcement Communications • Mutualinkplatform (desktop, laptop, etc.) running the Mutualink real-time communications application on a Security Enhanced (SE) Linux operating system.
Ruggedized Mobile Workstation IWS M500-150 Series
Phone: (866) 957-5465 Web: www.mutualink.net E-Mail: info@mutualink.net
RE DE F I NI NG INTERO PERABILITY Controllable
Intuitive
Mutualink, Inc.
1269 South Broad Street Wallingford, CT 06492
Affordable
About Mutualink, Inc.
F-35C Completes First Arrested Landing aboard Aircraft Carrier
T
he U.S. Navy made aviation history Nov. 3 as an F-35C Lightning II carrier variant Joint Strike Fighter conducted its first arrested landing
aboard an aircraft carrier off the coast of San Diego. Navy test pilot Cmdr. Tony Wilson landed F-35C test
aircraft CF-03 at 12:18 p.m. aboard USS Nimitz's (CVN 68) Also at the IACP event, Mutualink demonstrated Mutualink is an IP-based multimedia communication resource sharing platform that allows public safety agencies and critical community assets to communicate in a manner that is deck. flight its resilient peer-to-peer collaboration network for
separate and apart from the general public. The arrested landing is part of initial at-sea public safety, which provides proven, secure, reliable ABOUT MUTUALINK Mutualink technology is subject to US Patent #7,643,445, #8,364,153, #8,320,874 and Developmental Testing I (DT-I) for the F-35C, which communications for mission-critical homeland security other patents pending. Mutualink, Inc. has developed an interoperable commenced Nov. 3 and is expected to last two weeks. and law enforcement needs. The platform won the U.S. communications platform that enables community-wide Department of Defense (DoD) Joint Interoperability Test LMR radios, VoIP “push-to-talk”, telephone, cellular, Nextel & intercom £ Voice: "Today is a landmark event in the multimedia sharing of radio, voice, text, video, data files £ Video: Command certification for both Information Assurance live feeds from buildings, streets, cruisers, copters development of the F-35C," said Wilson, £ Text Messaging:and more effectivecommunications than voice for informational content telephone in a secure environment. and Interoperability. £ File Sharing: blue prints, floor plans, photos, procedures Mutualink’s system is currently deployed by hundreds a Navy test pilot with Air Test and IACP attendees at IACP enjoyed hands-on £ PA and Intercom System Interface: Broadcast Emergency Messages of public and private entities worldwide, including Dispatch Collaboration: off-the-air conferencing between dispatch centers Evaluation Squadron (VX) 23. "It is the demonstration of how a panic button trigger£an Thecan Mutualink IWS provides anhomeland incident-based highly intuitiveinstallations, graphical user interface (GUI) security and defense NATO incident connecting schools (or other facilities) their used by a dispatcher or incident manager to communicate with other that can be with effectively culmination of many years of hard work Special Operations Forces, police and fire departments, involved dispatch personnel as well as with units in the field. Interconnection of radio channels/ local police department in the event of an emergency © 2013 Mutualink, Inc. transit authorities, shopping malls,can casinos, by a talented team of thousands. I'm very talkgroups is facilitated using Mutualink’s drag andhospitals, drop interface. An IWS be used either using Mutualink’s K12 solution. In such an incident, Mutualink a privately-held company stand-alone, as apolice mini-console, and or inmore. combination withis an existing console position. The IWS excited to see America's newest aircraft departments can then invite other community is simple to partners use and easy to maintain. In addition, the multi-featured andR&D robust Mutualink headquartered in Wallingford, Conn., with software easy to manage for System and other personnel. TheRico, IWS is the on the flight deck of her oldest aircraft like hospitals, fire departments or state and is federal facilitiesAdministrators in Westford, Mass. and key Mayagüez, Puerto primary operational user interface for the Mutualink system. It consists of a standard x86 PC agencies participating on the IRAPP platform as necessary to laptop, etc.) running and Defense Services office nearby Washington, application DC. For on carrier, the USS Nimitz." (desktop, the Mutualink real-time communications more information please visit www.mutualink.net. Ω respond to and mitigate the emergency. a Security Enhanced (SE) Linux operating system. Commander, Naval Air Forces, Vice Adm. David H. The company’s suite of interoperability capabilities is Buss, was aboard Nimitz to witness the milestone event.
Ruggedized Interoperability Workstation | IWS
deployed and in use in the Orlando Police Department,
"What a historic day today is for Naval Aviation. With
as well as various area hospitals, schools, malls and other
the first traps and launches of the F-35C Lightning II
Critical Infrastructure and Key Resource (CIKR) entities.
Ruggedized Mobile Workstation IWS M500-150 Series
22 Government Security News
October/November 2014
aboard an aircraft carrier, we begin the integration of the next generation of warfighting capability into our carrierbased air wings," said Buss. "This important milestone is
Pacific Ocean (Nov. 3, 2014)
yet another indicator of Naval Aviation's ongoing evolution to meet future threats and remain central to our future Navy and National Defense Strategy." DT-I is the first of three at-sea test phases planned for the F-35C. During DT-I, the test team from the F-35 Lightning II Pax River Integrated Test Force (ITF) has scheduled two F-35C test aircraft from Naval Air Station Patuxent River in Patuxent River, Maryland to perform a variety of operational maneuvers, including various catapult takeoffs and arrested landings. ITF flight test operations also encompass general maintenance and fit tests for the aircraft and support equipment, as well as simulated maintenance operations. As with the initial testing of any new aircraft, the goal is to collect environmental data through added instrumentation to measure the F-35C's integration to flight deck operations and to further define the F-35C's operating parameters aboard the aircraft carrier. The ITF test team will analyze data obtained during flight test operations, conduct a thorough assessment of Continued on page 31
Digitlal Edition
Digitlal Edition
October/November 2014
Government Security News 23
å Romanowich on Video Surveillance Smart thermal cameras that incorporate video analytics provide substantial advantages over this
New physical standards in the works for electrical substations Attacks on transformer substations and other
traditional approach, increasing the probability of intruder detection while greatly reducing the nuisance alarms that have plagued automated perimeter systems in the past. These systems cover large distances and detect what a human would miss, while delivering John Romanowich President and CEO of SightLogix
components of the electrical grid in North America have
immediate, actionable information to enable fast response decisions. For this reason, many electrical utilities are already
underscored the risks associated with physical security
and vulnerabilities of physical attacks on the targets
using smart thermal video cameras to provide accurate,
breaches and the potentially disastrous consequences.
they’ve identified as most critical, and then deploy
reliable performance in even the
With the tens of thousands of substations across the U.S.
and implement physical security plans to cover those
most challenging conditions. For
situated in locations that range from isolated remote
locations. Finally, utilities will undergo another third-
example, some smart thermal
areas to densely populated urban areas, the job of
party review to evaluate their gap analysis and physical
cameras can discriminate small
securing these critical assets is challenging at best for
security plans. These requirements will be implemented
differences between the temperature
security professionals.
in phases, giving utilities adequate time to prepare for
of a person and the background,
and implement physical security upgrades.
accurately detecting intruders even
To provide guidelines to ensure greater physical security around substations, the Federal Energy
Equipment selection and purchase will be crucial
This underscores the need for security
technologies for ensuring compliance with this fast-approaching regulation. SightLogix Thermal SightSensor
True security means stopping an event by detecting intruders as early as possible,
in less than ideal conditions. They
latest Critical Infrastructure Protection (CIP) standard.
understand what utilities will be looking for. When it
lighting issues that cause false detections with visible
Developed by the North American Energy Reliability
comes to equipment, utilities are generally hesitant
light cameras. Because they can detect in complete dark,
Corporation (NERC), CIP-014 is a mandatory physical
to invest in products that have no real track record of
bright sunlight, or poor weather, smart thermal cameras
security standard for critical components of the
success. They also want to ensure that they are receiving
can be counted on to secure outdoor areas 24/7. The
power grid that is expected to be finalized soon. Upon
the best return on their investment in physical security.
alerts smart thermal cameras generate when – or even
completion, CIP-014 will serve as a blueprint to help
Traditionally, utilities have relied on a combination of
before – an intrusion occurs, allow security personnel to
both utilities and security professionals understand the
some type of blind sensor – such as coax or fiber on a
view real-time video to determine if there is activity to be
requirements to protect these vital assets.
fence to act as an activity detector – with video security
stopped. This advanced detection provides alerts before
solutions, but the reliability and accountability of these
an individual has an opportunity to steal, vandalize or
to identify their most critical substations – those that if
systems is diminished by the many nuisance alerts they
disrupt substation operations.
damaged or taken offline would cause major problems
generate. These blind sensors also fall short of the intent
for the power grid. To comply, utilities will need to
of this new regulation to provide early detection outside
laid out in CIP-014, the remainder are expected to follow
perform a gap analysis to evaluate potential threats
of the fence line for advance warning.
suit in the near future to ensure their planned physical
Digitlal Edition
work necessitated by these upgrades at their substations.
themselves on CIP-014 and the best
will ignore headlights, reflections off water, or other
October/November 2014
acquire proper permits for any construction or other
installers and integrators to educate
to meeting CIP-014 requirements, so it’s important to
24 Government Security News
any issues with light and/or sound around the site, and
solution providers and system designers,
Regulatory Commission (FERC) is currently finalizing the
Following CIP-014’s finalization utilities will be tasked
security upgrades meet local zoning regulations, address
While some utilities have already begun the processes
Digitlal Edition
ideally before they enter a secured area, and alerting security staff. When it comes to protecting these critical assets, this real-time awareness is critical to ensuring a timely response and preventing theft, vandalism, accidents and other potentially dangerous activities or events that could disrupt the stability of the power grid. Given their proven track record of providing a high level of security for substations, smart thermal systems are the most reliable solution for providing the advanced detection and real-time awareness necessary to protect substations while satisfying CIP-014 security mandates. Ω John Romanowich is the President and CEO of SightLogix
October/November 2014
Government Security News 25
æ CASE STUDY
THE PORT OF CHARLESTON, SC
his credentials was needed to customize a plan complying
based on turn times,” Brown explained. “But you’ve got
with new legislation.
shipping lines that rely on the Port Authority to securely transfer their cargo and 105 Regulations in place, so Port
IDENTIFYING THE CHALLENGES
Police needs the security of the terminal ensured.”
In evaluating program options, Brown considered
PURETECH SYSTEMS
issues as one of the most difficult functions he performs,
ensuring secure transfer of cargo was a key focus at
and cites strong communication as the key to effectively
Wando Welch Terminal, and roving patrols by Port Police
bridging the gap between Operations and Security. He
managed loss prevention. With the prospect of terrorist
coordinates closely with port operations, engineering,
breach, a system that could reliably detect and monitor
IT and maintenance teams. He also regularly consults
disturbances at the perimeter became the new paradigm.
port police, customs and border protection, the U.S.
successfully addressed a marine environment; one that
program at Port of Charleston created by Congress under
remained in near constant motion between ship, vehicle
the guidance of the Department of Justice to enhance
and foot traffic. This scenario would trigger nuisance
port security operations, capabilities and coordination. By
alarms in most security systems, so the new system
understanding and addressing the needs of each of these
and ignore traditional environmental Brown is a civil engineer with an imposing
ports along the United States’ Southeast and
background in antiterrorism force protection, blast-
Gulf coasts. Moving more than 600,000 pier
resistant structural design and high security access
disturbances to avoid desensitizing monitoring personnel with false positives. Another challenge was balancing
containers per year and ranked 8th largest U.S. port
control for the U.S. government and military. Prior to his
in cargo value, with $50 billion in annual shipments,
involvement with Port of Charleston, he served as team
Charleston is recognized as North America’s most
leader for the U.S. Coast Guard’s National Facility Security
efficient and productive port. As a vital hub for global
Plan Review Center, whose mandate was to review U.S.
terror measures had the potential to
freight transfer, implementing a site protection solution
ports for compliance with 33 CFR Part 105 Regulations.
slow the pace of a facility consistently
that would safeguard facility infrastructure without
These post-9/11 performance guidelines call for
recognized for high productivity. It was
adverse affect to flow of cargo was a critical goal.
perimeter monitoring, access control and anti-terrorism
imperative to narrow the solutions to
readiness for marine facilities receiving regulated
those that delivered superior intrusion
terminal, both in cargo volume and physical size. Jeff
cargo, and require that restricted areas - both land and
detection without being cumbersome to
Brown, HNTB consultant and contractor to South Carolina
waterside perimeters - be continuously monitored.
administrate.
Wando Welch Terminal is Port of Charleston's largest
the divergent priorities of airtight terminal security and efficient cargo transfer. By definition, complex counter-
State Port Authority, has managed the SCSPA security
As the Coast Guard representative responsible
“At the very core, Port Operations
program since 2005. Overseeing perimeter protection
for reviewing South Carolina State Port Authority’s
and Port Security are 180 degrees out
and access control for the Port’s terminals, he was tasked
facility security plan, Jeff evolved into directing Port of
of phase because Operations wants to
with enhancing Waldo Welch’s perimeter security system.
Charleston’s security operations when a consultant with
move cargo as quickly as possible. It's all
26 Government Security News
October/November 2014
Coast Guard, and Project Seahawk – an innovative pilot
needed the intelligence to recognize WWT© Marvin Preston 2011
P
ort of Charleston is one of the busiest container
the Port’s unique security challenges. Prior to 9/11,
A must for Brown was finding a solution that
Integrating Fence Detection And Video Analytics
Brown describes working through these conflicting
Digitlal Edition
Digitlal Edition
October/November 2014
Government Security News 27
æ CASE STUDY
service that included 24-hour response time, 72-hour resolution of issues and a 3-year warranty on installed
THE PORT OF CHARLESTON, SC • PURETECH SYSTEMS
product.
constituents, Brown has manages to deliver a security
AN INTELLIGENT SOLUTION
program that satisfies all parties.
According to Port of Charleston’s Security Improvement
DEVELOPING A PLAN
Plan, a key requirement of the new perimeter system
Mapping out security program expansion guidelines for
was its ability to precisely locate fence line breaches
each of the facility’s five non-continuous terminals was
and monitor intruders from point of attack through
Port of Charleston’s greatest challenge.
incident resolution. Brown acknowledged that it would be
“105 Regulations say that you have to monitor your
unmanageable and costly to install cameras along every
perimeter and access points, but it’s up to the individual
linear foot of its irregular boundary for this purpose.
PureActiv® provides intelligent video analytics, 3D geospatial command and control, autonomous PTZ tracking and open architecture for ease of integration with the MicroPoint™ Cable system.
Southwest Microwave’s MicroPoint™ Cable system pinpoints fence cut or climb attempt to within 3m, while ignoring environmental disturbances such as wind, rain or vehicle traffic.
Instead, the Port chose two market-leading intelligent
an industry best-practice concept incorporating solutions
in the Port’s ongoing success in securing grant monies for
pinpoint intrusion location and tie-in of detection zones
that delivered the protection required by Port Authorities,
bringing the security upgrades to fruition.
to CCTV camera presets - and PureTech’s PureActiv®
autonomous PTZ tracking and open architecture which
wide area video surveillance system - which successfully
easily integrated with MicroPoint™ and our Lenel access
identified and tracked qualified targets.
control system.”
entities to figure out how to comply,” Brown explained. To address this responsibly, Brown and his team formulated a comprehensive Security Improvement Plan -
and addressed the risks identified by the Port during
THE INTEGRATION PARTNER
vulnerability assessments. “To put together a plan of this magnitude, we had
Upon plan approval, Brown tackled hiring a systems
detection solutions: Southwest Microwave’s INTREPID™ MicroPoint™ Cable fence detection system - which offered
"There weren't many companies who could deliver
Brown recognized that the Southwest Microwave
to take a holistic approach,” outlined Brown. “There
integrator to handle the installation. To attract only highly
what we wanted," said Brown. "We went through an
fence detection system had been successfully paired
was extensive coordination between Operations and
qualified candidates, he employed rigorous selection
exhaustive process to ensure that we were going to get
with PureTech's video analytics package at many other
Security. Each of the Port’s various internal and external
criteria that included evaluation of each firm’s technical
the most appropriate, best of breed perimeter security
sites. “The fact that this was not the first time these two
constituents were consulted.”
certifications, breadth of manpower, implementation
system."
products have been integrated, that all the kinks had
Traffic flow at each terminal was evaluated toward restricted area boundary redefinition, and detailed site diagrams and project cost estimates were developed.
history for similar systems and quality assurance parameters. “We had our design, so everyone would be delivering
The synergistic solution they selected enabled the Port to strategically place visible light, infrared illuminated
been ironed out, was invaluable to me.”
and thermal pan-tilt-zoom cameras controlled by the
EXTENSIVE TESTING
The plan eventually included equipment design and
the same product,” Brown recalled. “I wanted to
PureActiv system at key points along the perimeter, and
Once the MicroPoint™ Cable / PureActiv® system was
performance specifications for the initial upgrade at
know how a prospective partner would strategically
integrate them with the MicroPoint™ Cable system to
installed, the Port’s security team, I-Sys Corporation and
Wando Welch Terminal.
approach the installation, and what they would do to
quickly locate and react to intrusions across the port’s
PureTech conducted thorough performance verification
set themselves apart. We expected a thorough plan of
vast property.
testing to ensure round-the-clock functionality at every
“This master plan has been critical to the success of Port of Charleston’s security program,” Brown emphasized. “All affected parties agreed on it. Everybody
action.” Port of Charleston ultimately selected I-Sys
®
“We chose MicroPoint™ because it was the only sensor that could detect to within 3 meters
point along the fence line. “We painstakingly went to each camera and had an
understands what is expected, how it will be delivered
Corporation of North Charleston, South Carolina.
and direct camera PTZ activity to incident location,”
‘intruder’ run, walk, roll, crawl and climb the fence to
and what the price tag will be.” In fact, Brown reports that
Along with capabilities that satisfied Brown’s stringent
Brown explained. “PureActiv provided intelligent
ensure that cameras and fence sensors worked properly,”
the plan's elaborate detail has been an important factor
requirements, I-Sys committed to providing a level of
video analytics, 3D geospatial command and control,
said Brown. With an extensive array of PTZ cameras, this
28 Government Security News
October/November 2014
Digitlal Edition
®
Digitlal Edition
October/November 2014
Government Security News 29
æ
æ
UPFRONT
CASE STUDY
Continued from page 23
THE PORT OF CHARLESTON, SC • PURETECH SYSTEMS
how well the F-35C operated in the shipboard environment, and advise
endeavor took weeks to complete. While Brown concedes
that reinforces both systems' smart sensor capabilities.
that the testing was more rigorous than most, results
MicroPoint's unique ability to assign detection zones in
were overarchingly positive.
system software at any point along the cable has reduced
"I expected our vendor to prove to me that the
hardware requirements and simplified assessment.
system was ready to do what it needs to do," Brown
PureTech's analytics can identify targets at long ranges,
recalled. "They knocked it out of the park. It was an
minimizing the required number of cameras and
amazing success." In fact, Brown remarked that in
simplifying monitoring processes. By employing standard
general, the new solution far exceeded his expectations
cameras, the PureActiv system further reduces cost and
both during the testing phase and initial implementation.
gives the port installation flexibility without compromising
®
detection standards.
A SOLID SOLUTION
“I could not be more pleased with the new system,"
Port of Charleston's new perimeter detection system
Brown stated emphatically. "I do not think there are other
solves the facility's main concerns, terrorist breach and
products out there that do what MicroPoint™ Cable and
cargo loss.
over the next few decades," said Lt. Gen. Chris Bogdan, F-35 Program Executive Officer. "For months, we've been working with the Nimitz crew, Naval Air Forces, and our industry partners, Lockheed Martin and Pratt & Whitney, as well as their suppliers, to prepare and train for this event. We plan on learning a lot during this developmental test and will use that knowledge to make the naval variant of the F-35 an even more effective weapons platform." The F-35C combines advanced stealth with fighter speed and agility, fused targeting, cutting-edge avionics, advanced jamming, networkenabled operations and advanced sustainment. With a broad wingspan,
capabilities of carrier air wings and joint task forces and will complement
disturbances, then smoothly tracks and manages
the capabilities of the F/A-18E/F Super Hornet, which currently serves as
qualified events until they are resolved.
the Navy's premier strike fighter.
Each product has contributed to solving
By 2025, the Navy's aircraft carrier-based air wings will consist of a
environmental nuisance alarm issues common
mix of F-35C, F/A-18E/F Super Hornets, EA-18G Growlers electronic attack
to other detection technologies. MicroPoint™
aircraft, E-2D Hawkeye battle management and control aircraft, MH-60R/S
effectively identifies fence attacks while ignoring
helicopters and Carrier Onboard Delivery logistics aircraft.
distributed environmental disturbances such
The successful recovery of the F-35C represents a step forward in the
as truck traffic at the Port. PureActiv® copes
development of the Navy's next generation fighter and reinforces Navy-
exceptionally well with the diversity of port
industry partnership goals to deliver the operational aircraft to the fleet in
environments, including busy waterside cargo loading areas, long fence lines, active roadways and
PureActiv® can. These solutions are so well integrated
controlled entrance and egress points.
that I almost forget that they are two separate systems. The entire perimeter security system performs the way
delivered the Port a cost-effective solution for detecting
it’s supposed to. If every system I implemented worked as
intrusions along a lengthy perimeter, and an efficiency
well, then my job would be easy.” Ω
October/November 2014
for today. This will be one landing out of thousands more that will happen
The F-35C will enhance the flexibility, power projection, and strike
PureTech’s PureActiv® system reliably analyzes
Digitlal Edition
January-March, 2015
"Our F-35 integrated test team has done an amazing job preparing
delivering a lethal combination of fighter capabilities to the fleet.
a cut or climb attempt to within one fence panel.
December 2014
generation fighter is fully capable and ready to deploy to the fleet in 2018.
the F-35C is designed to stand up to harsh shipboard conditions while
Cable system allows the Port to confidently pinpoint
The MicroPoint™ Cable / PureActiv® solution has
the Navy to make any adjustments necessary to ensure that the fifth-
reinforced landing gear, ruggedized structures and durable coatings,
Southwest Microwave’s INTREPID™ MicroPoint™
30 Government Security News
Coming Attractions
2018. For more news from Commander, Naval Air Forces, visit www.navy.mil/local/airpac/. Ω
Digitlal Edition
December Digital Edition 2014 Digital Yearbook of Homeland Security Awards Recipients January Print Edition Technology Focus: Perimeter Protection and Short Wave Detection Market Sector Focus: Airport/ Aviation Security February Digital Edition Technology Focus: Access Control/ID, Biometrics Market Sector Focus: Energy, Nuclear, Infrastructure And Grid Protection March Print Edition Technology Focus: Cybersecurity/Closing The Gap Market Sector: Maritime/Port Security Topics We’re Following Throughout the Year: Protecting the Grid Closing the Cyber Gap The Immigration Crisis Social Media in Law Enforcement
October/November 2014
Government Security News 31
Continued from page 16
of interest, reach targets quickly and take action as
“As security cameras proliferate, more and more
required. BriefCam stresses ease of use, integrating user
investigations are crowdsourcing video from the public
experience and intuition as a vital part of the process; the
for intelligence gathering and post-event investigation,”
human mind and eye are always engaged.
Irani noted. “More evidence is a boon to investigators
In addition to fast video review, BriefCam Syndex
but also means hours, days and even weeks of video are
augments the basic Video Synopsis by providing users
collected – that’s where rapid video review is absolutely
with a powerful set of tools for searching video according
essential. Crowdsourcing also increases the need for
to attributes that
greater control over privacy.”
they define: size,
In line with the trend, BriefCam Syndex GV’s enhanced
color, speed,
collaborative investigation tools include permissions
direction and
limitations so that camera access is restricted in
location within
accordance with the individual investigator’s viewing
the frame. All
rights. Ω
parameters are under the user’s control – even the
ABOUT BRIEFCAM
order of objects
BriefCam®, Ltd. is the developer and provider of Video Synopsis®, an award-winning technology that summarizes hours of events into a “brief ” that extracts maximum value from video, recorded and live. BriefCam products interface with a wide range of video recorders, advanced IP cameras and complement existing surveillance solutions. BriefCam is winner of the 2013 SIA New Product Showcase for Video Analytics, 2012 Israel HLS Technology Innovation Award, 2011 ASIS Accolades Award - Surveillance, 2010 IFSEC Security Industry Award - Best CCTV System Product, 2010 Wall St. Journal Technology Innovation Award - Physical Security and others. Founded in December 2007, BriefCam, Ltd. is headquartered in Modi'in, Israel, with subsidiaries in Connecticut, USA and Shanghai, China. For more information: www.briefcam.com. For updates: https://twitter.com/BriefCamVS.
displayed. Like all search engines, BriefCam Syndex ranks results in
Review hours of video in minutes. Select, view and zoom in on events of interest
order by probability to ensure the most relevant events of interest are presented first. BriefCam Syndex is also offered as a standalone product intended mainly for law enforcement and individual security investigators (FS) and for investigative teams (FS+), or as an integrated/embedded product within the VMS environment for medium-sized enterprises (EP) and large/growing ones (EP+). New features incorporated into BriefCam Syndex GV include floating licenses so that cameras can be assigned and reassigned among authorized users, mobile (thin) client support, in/out zoom, and multiple video source capability that enable processing of video input from the agency-owned VMS as well as from imported external video footage. 32 Government Security News
October/November 2014
Digitlal Edition
G O V E R N M E N T
Security News
The News Leader in Physical, IT and Homeland Security Publisher:
Columnist:
Interim Production Manager:
Michael Madsen (O) 212-344-0759, X1 (C) 732-233-8119 mmadsen@gsnmagazine.com
John Convy Convy on Netcentric Security john@convyassociates.com
Executive Editor:
Vance Klein crosscheckdesigns.com (O) 212-344-0759, X4 (C) 914-245-6662 vancemk@mac.com
John Romanowich Romanowich on Video Surveillance jromanowich@sightloxic.com
John Wagley (O) 212-344-0759, X2 (C) 202-425-0196 Wagley.jr@gmail.com
Senior Writer: Lorrie Barclay (O) 212-344-0759, X5 (C) 508-685-0652 lorriebarclay@gmail.com
Columnist:
Guest Expert Contributor: Denise Rucker Krepp (C) 202-546-2533 kdrkrepp@hotmail.com
Editorial Director/CEO Adrian Courtenay (212) 344-0759, X3 (C) 917-696-5782 acourtenay@gsnmagazine.com MEDIA KIT
Art Director: Vance Klein crosscheckdesigns.com (O) 212-344-0759, X4 (C) 914-245-6662 vancemk@mac.com
SUBSCRIBE
Mailing Address: Government Security News P.O. Box 7608 Greenwich, CT 06836
Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT , 06836, Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government decision makers and business executives involved with security products, Systems and series. Qualified U.S. subscribers received GSN: Government Security News At no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and foreign subscribers are charged $140 International Airmail. Copyright 2014 by GSN: Government Security News. All rights reserved. Printed in the U.S.A. GSN: Government Security News assumes responsibility for validity of claims in items reported. Digitlal Edition
October/November 2014
Government Security News 33
PIVotal Security.
pivCLASS® readers and software from HID Global provide security and compliance. HID Global’s pivCLASS® reader solutions PIV-enable existing physical access control systems (PACS) without the need to “rip and replace” valuable infrastructure, reducing costs, minimize disruptions, and preserving investments. And, HID’s pivCLASS off-the-shelf software solves the problem of validating, authenticating and registering PIV card data in a PACS – all without custom programming. pivCLASS software also automatically revalidates PIV card certificates periodically to make sure your PACS is always up to date. To make the pivotal move to compliance, visit hidglobal.com/piv-gsn © 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design and pivCLASS are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.
34 Government Security News
October/November 2014
Digitlal Edition